
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream
K. Simran, Prathiksha Balakrishna, R. Vinayakumar, et al.
Communications in computer and information science (2020), pp. 135-145
Closed Access | Times Cited: 12
K. Simran, Prathiksha Balakrishna, R. Vinayakumar, et al.
Communications in computer and information science (2020), pp. 135-145
Closed Access | Times Cited: 12
Showing 12 citing articles:
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications
Thomas Browne, Mohammad Z. Abedin, Mohammad Jabed Morshed Chowdhury
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2911-2938
Open Access | Times Cited: 5
Thomas Browne, Mohammad Z. Abedin, Mohammad Jabed Morshed Chowdhury
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2911-2938
Open Access | Times Cited: 5
Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective
Thea Riebe, Julian Bäumler, Marc–André Kaufhold, et al.
Computer Supported Cooperative Work (CSCW) (2023) Vol. 33, Iss. 2, pp. 205-251
Open Access | Times Cited: 11
Thea Riebe, Julian Bäumler, Marc–André Kaufhold, et al.
Computer Supported Cooperative Work (CSCW) (2023) Vol. 33, Iss. 2, pp. 205-251
Open Access | Times Cited: 11
Enhancing Cyber Threat Detection with an Improved Artificial Neural Network Model
Toluwase Sunday Oyinloye, Micheal Olaolu Arowolo, Rajesh S. Prasad
Data Science and Management (2024)
Open Access | Times Cited: 2
Toluwase Sunday Oyinloye, Micheal Olaolu Arowolo, Rajesh S. Prasad
Data Science and Management (2024)
Open Access | Times Cited: 2
CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data
Thea Riebe, Tristan Wirth, Markus Bayer, et al.
Lecture notes in computer science (2021), pp. 429-446
Closed Access | Times Cited: 13
Thea Riebe, Tristan Wirth, Markus Bayer, et al.
Lecture notes in computer science (2021), pp. 429-446
Closed Access | Times Cited: 13
TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification
Yizhe You, Zhengwei Jiang, Kai Zhang, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2022), pp. 272-279
Closed Access | Times Cited: 4
Yizhe You, Zhengwei Jiang, Kai Zhang, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2022), pp. 272-279
Closed Access | Times Cited: 4
A Framework for Unsupervised Classificiation and Data Mining of Tweets about Cyber Vulnerabilities
Kenneth Alperin, Emily Joback, Leslie Shing, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 5
Kenneth Alperin, Emily Joback, Leslie Shing, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 5
Security in Computing and Communications
Sabu M. Thampi, Gregorio Martínez Pérez, Ryan K. L. Ko, et al.
Communications in computer and information science (2020)
Closed Access | Times Cited: 4
Sabu M. Thampi, Gregorio Martínez Pérez, Ryan K. L. Ko, et al.
Communications in computer and information science (2020)
Closed Access | Times Cited: 4
Semantically Modeling Cyber Influence Campaigns (CICs): Ontology Model and Case Studies
Nathan Johnson, Benjamin Turnbull, T. P. Maher, et al.
IEEE Access (2020) Vol. 9, pp. 9365-9382
Open Access | Times Cited: 4
Nathan Johnson, Benjamin Turnbull, T. P. Maher, et al.
IEEE Access (2020) Vol. 9, pp. 9365-9382
Open Access | Times Cited: 4
Obtaining Cyber Threat Intelligence Data From Twitter With Deep Learning Methods
Ugur Tekin, Ercan Nurcan Yılmaz
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (2021)
Closed Access | Times Cited: 4
Ugur Tekin, Ercan Nurcan Yılmaz
2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (2021)
Closed Access | Times Cited: 4
A Survey on Detection of cybersecurity threats on Twitter using deep learning
Omar Alsodi, Xujuan Zhou, Raj Gururajan, et al.
(2021), pp. 1-5
Closed Access | Times Cited: 3
Omar Alsodi, Xujuan Zhou, Raj Gururajan, et al.
(2021), pp. 1-5
Closed Access | Times Cited: 3
Cross-site Scripting Threat Intelligence Detection Based on Deep Learning
Zhonglin Liu, Yong Fang, Yijia Xu
Communications in computer and information science (2022), pp. 89-104
Closed Access
Zhonglin Liu, Yong Fang, Yijia Xu
Communications in computer and information science (2022), pp. 89-104
Closed Access
Investigating User Information and Social Media Features in Cyberbullying Detection
Jiabao Qiu, Nihar Hegde, Melody Moh, et al.
2021 IEEE International Conference on Big Data (Big Data) (2022), pp. 3063-3070
Closed Access
Jiabao Qiu, Nihar Hegde, Melody Moh, et al.
2021 IEEE International Conference on Big Data (Big Data) (2022), pp. 3063-3070
Closed Access